Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Management Tools for Internet Applications., and . iTrust, volume 2692 of Lecture Notes in Computer Science, page 91-107. Springer, (2003)Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities., , , and . MedInfo, volume 129 of Studies in Health Technology and Informatics, page 483-487. IOS Press, (2007)A Survey of Trust in Internet Applications., and . IEEE Commun. Surv. Tutorials, 3 (4): 2-16 (2000)First international workshop on privacy and security in programming (PSP)., , and . SPLASH (Companion Volume), page 83-84. ACM, (2014)A Risk Management Framework for Health Care Data Anonymization., and . HealthSec, USENIX Association, (2010)Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud., , , , , , , and . SOLI, page 111-116. IEEE, (2012)Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques., , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 265-271. Springer, (2011)Cloud Log Forensics Metadata Analysis., , , and . COMPSAC Workshops, page 194-199. IEEE Computer Society, (2012)Specifying and Analysing Trust for Internet Applications, and . (2002)Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , and . DBSec, volume 7964 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)